Dynamic-Rabbits / Taint-EvaluatorLinks
A suite of experiments for evaluating open-source binary taint trackers.
☆32Updated 3 years ago
Alternatives and similar repositories for Taint-Evaluator
Users that are interested in Taint-Evaluator are comparing it to the libraries listed below
Sorting:
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- ☆21Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆43Updated 3 years ago
- ☆39Updated 2 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 2 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆31Updated 3 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- ☆43Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆29Updated last year
- ☆72Updated last year
- ☆12Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Virtual Inheritance Reverse Engineering☆17Updated 5 years ago